Mobile Computing
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • Unified Communications
  • Security
  • Mobile Computing
    • Mobile Application Strategy
    • Mobile Infrastructure
    • Mobile Management
    • Mobile Security
    • Operating Systems & Devices
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Videos

Photo Stories

  • Top 10 disruptive technology vendors in the enterprise

View all Photo Stories

Podcasts

  • iOS 13 analysis with Aaron, Russ, and Jack - BrianMadden.com Podcast #140

View all Podcasts
Latest TechTarget resources
  • Networking
  • Unified Communications
  • Security
Search Networking
  • 14 common network protocols and their functions explained

    Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are ...

  • 5 principles of change management in networking

    Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

  • A guide to Li-Fi technology

    Li-Fi is an emerging wireless technology that uses visible light to transmit data instead of radio frequencies. Though still ...

Search Unified Communications
  • Understanding VoIP multi-codec transcoding

    VoIP relies on codecs that permit the seamless connection between callers and networks. But there are many codecs and multiple ...

  • Pros and cons of a hybrid contact center architecture

    A hybrid cloud architecture can provide modern capabilities to legacy contact centers. Explore the benefits and challenges of ...

  • What do huddle rooms look like in a post-pandemic workplace?

    Huddle room hype has waned, but it helped promote the concept of simplifying video in the workplace. Now, organizations could ...

Search Security
  • New York fines Geico, Travelers $11.3M over data breaches

    The two insurance giants were fined millions by New York state regulators and are required to enhance security protocols around ...

  • Russian hackers exploit Firefox, Windows zero-days in wild

    RomCom threat actors chain two Firefox and Windows zero-day vulnerabilities together in order to execute arbitrary code in ...

  • AWS CISO details automated cybersecurity tools for customers

    Chris Betz, CISO at AWS, discusses how three internal tools are designed to automatically identify and mitigate threats for the ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

All Rights Reserved, Copyright 2003 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close